Email Policy Electronic communication policy

Internet, E Mail and
Electronic Communication Policy

Download Table of Contents

 

This policy is twenty-three (23) page in length, is compliant with all recent legislation (SOX, HIPAA, Patriot Act, and Sensitive information), and covers:

  • Appropriate use of equipment
  • Internet access
  • Electronic Mail
  • Retention of e-mail on personal systems
  • E-mail and business records retention
  • Copyrighted materials
  • Banned activities
  • Ownership of information
  • Security
  • Sarbanes-Oxley
  • Abuse

Included with the policy are forms that can be used to facilitate the implementation of the policy. Included are these ready to use forms:

  • Internet & Electronic Communication Employee Acknowledgement (short form)
  • E-Mail - Employee Acknowledgement (short form)
  • Internet Use Approval Form
  • Internet Access Request Form
  • Security Access Application Form

Download Table of Contents

The WORD template uses the latest CSS style sheet and can easily be modified to conform to the style used in your enterprise policy manual.

 

CSS Style Sheet

Download Table of Contents

 

 

 

 

Latest Policy News


Every Business Needs Security

January 22nd, 2016

Every Business Needs Security

 

Every business needs securityOf the hundreds of data breaches that occurred in 2015, most people can only name those that targeted major corporations: BlueCross BlueShield, Experian, Ashley Madison, etc. However, just because these massive thefts were the only ones to make the news doesn’t mean smaller businesses are safe from cyberattacks; in fact, oftentimes they are even more vulnerable to digital disasters.

 

A majority of small businesses are woefully under-protected against cyberthreats, but erroneous feelings of invincibility are preventing businesses from correcting their cybersecurity mistakes. Learning why security is important for every business - no matter how small - will help companies stay alive in this dangerous digital climate.

 

Order Security Manual Download Selected Pages

- more info

Cost of averge security breach $3.8 million

January 7th, 2016

Cybersecurity threats are on the rise. In 2015 the average cost of a data breach was $3.79 million, and that figure is expected to grow to close to $5 million by the end of this year.

Security RisksAreas of concern are:

  • Cloud Services - danger that they’re bypassing security protocols and systems in the process
  • Ransomware - Kits for this software are now readily availalbe. The attack encrypts important files, rendering data inaccessible until you pay the ransom.
  • Spear phishing - Phishing attacks are growing more sophisticated all the time, as official-looking messages and websites, or communications that apparently come from trusted sources, are employed to gain access to your systems.
  • Known vulnerabilities - Once these are published everyone is exposed
  • Internet of Things - As connectivity spreads into every corner of our lives and businesses, it becomes more and more challenging to maintain a clear view of entry points and data flow.

Order Security Manual Download Selected Pages

- more info

FBI can demand web history without a warrant

December 1st, 2015

FBI can demand web history without a warrant

The FBI can compel companies and individuals to turn over vast sums of personal data without a warrant. The FBI has used its authority to force companies and individuals to turn over complete web browsing history; the IP addresses of everyone a person has corresponded with; online purchase information, and also cell-site location information, which he said can be used to turn a person's phone into a "location tracking device.

Security Policies - Procedures - Audit Tools

Order Security Manual Download Selected Pages


- more info

Cybercrime costs businesses millions of dollars

October 23rd, 2015

Cybercrime costs businesses millions of dollars.

A recent survey of US companies reports an average cost at $15 million and in Russian the average cost at $2.4 million. Part of the differance is the dependance of US companies on the Internet.

Order Security Manual Download Selected Pages

Security Policies - Procedures - Audit Tools

Order Security Manual Download Selected Pages

- more info

World Class CIOs are focusing on wearable device Security

August 2nd, 2015

Wearable Device Security -- Janco Associates has determined that most mobile devices have some major vulnerabilities. They include:

  • Insufficient User Authentication/Authorization
  • Data Encryption Missing
  • Insecure Interfaces
  • Software/Firmware Updates Not Secure
  • Privacy Controls are missing

The purpose of the Wearable Device Policy Template is to define standards, procedures, and restrictions for end users who have specific and authorized business requirements to use the devices connected via a wireless or unmanaged network outside of ENTERPRISE’s direct control.

Wearable Device Policy - It is 17 pages in length. It contains everything that an enterprise needs to implement a functioning and compliant Wearable Devices device and use process. Included are forms defining the mobile device environment.

 Download Selected Pages

- more info

Disaster Recovery Digest

July 1st, 2015

Disaster Recovery Digest

Disaster Business Continuity Preparation
Order DRP BCPSample DRP BCP
  1. Google data center security & disaster recovery This is a great video on physical security as well as the the software security. This is a great primer which all CIOs and Data...
  2. 10 best practices for cloud disaster recovery Cloud Disaster Recovery 10 Best Practices Creating out a complete cloud disaster recovery infrastructure can be cost prohibitive for many organizations.  Ten best practices are:...
  3. Will your disaster recovery provider be in business when you need them? Disaster Recovery plans that depend on outsourcers face significant additional risk What if your were in Florida and the Hurricane season was in full swing...
  4. Options for a data center disaster recovery strategy Data Center disaster recovery strategy – options A critical component of a disaster recovery business continuity is the data center disaster recovery strategy — Hot...
  5. Infrastructure Key to Data Center Management and Disaster Recovery Infrastructure is key to data center management Data Center Management Issues – Your data centers are stuck in a rut. While 90 per cent have...

Order DRP BCPSample DRP BCP

- more info

IT hiring takes off - Over 140,000 jobs added in the last 12 months

June 13th, 2015

The IT Job Market job market kicked into higher gear in May, with more than 14,000 new jobs added in the field nationwide.

Janco Associates, which tracks IT jobs and CIO hiring trends, crunched the latest employment data released by the Bureau of Labor Statistics and found hiring in the IT sector once again on an upswing after the relative doldrums of the first quarter.

IT Hiring IT Job Descriptions IT Salary SurveyIT Salary SurveyJob Descriptions
Order IT Hiring Kit
- more info

BYOD management key concern of many C-Level executives

June 2nd, 2015

BYOD management key concern of many C-Level executives

Bring Your Own Device Sample

Three concerns for management of BYOD are:

  • Take control of BYOD costs by automatically tracking and billing work-related spend on employee-owned devices on almost any network
  • Enable employees to be more productive by eliminating time-consuming manual processes
  • Reduce the effort and cost of monitoring, processing and reporting BYOD expenses

BYOD Policy Template meets all mandated compliance requirements

Janco, in concert with a number of world class enterprises had created a BYOD Policy Template that addresses these issues and provides solutions for the following questions:

  • What are the legal implication of BYOD - What is the impact of the Stored Communication Act - Record Retention and Destruction?
  • What happens to the data and audit trail on a BYOD when an employee leaves the company?
  • What about a lost or stolen BYOD?
  • How is the BYOD configured to receive and transmit corporate data?
  • What kind of passwords are acceptable to use on a BYOD?
  • What kind of encryption standards are acceptable for BYOD?
  • What types of BYOD are allowed and what types are not?
  • What about jail broken, rooted or compromised BYOD?
- more info

16 States have 6% unemployment rates

May 28th, 2015

In the month of April ther are 16 states with an unemployment rate of over 6%.  In addition there are 11 states where the unemployment rate has risen in the last 3 months. The states with the greatest increase in unemployment are West Virgina (from 6.1% to 7.0%) and Alaska (from 6.3% to 6,7%.

Order Salary Survey    Free Salary Survey
- more info

Will the information agecontinue to disrupt old ways

May 13th, 2015

The information age is upon us and will continue to disrupt old ways of doing things and replace them with new digitally driven processes. Will this transformation be like the Industrial Revolution, painful but ultimately democratizing by increasing incomes and leisure time for the vast majority of Americans? Or will it escalate inequality and continue to hollow out the middle class?

IT Infrastructure Policies and Procedures

One of the best ways to communicate and understand a company and its operating culture is through its policies. Designing and writing policy and communicating it effectively is an essential skill for professionals to have. By having policy carefully developed and communicated, employees will clearly know what the organization expects from them, the degree of control and independence they will have, and what the benefits and consequences are in regard to adhering to policy.

IT Infrastructure PoliciesInfrastructure Policy Sample

- more info